cve/2022/CVE-2022-25165.md

32 lines
1.8 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-25165](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25165)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was discovered in Amazon AWS VPN Client 2.0.0. A TOCTOU race condition exists during the validation of VPN configuration files. This allows parameters outside of the AWS VPN Client allow list to be injected into the configuration file prior to the AWS VPN Client service (running as SYSTEM) processing the file. Dangerous arguments can be injected by a low-level user such as log, which allows an arbitrary destination to be specified for writing log files. This leads to an arbitrary file write as SYSTEM with partial control over the files content. This can be abused to cause an elevation of privilege or denial of service.
### POC
#### Reference
- https://github.com/RhinoSecurityLabs/CVEs
- https://rhinosecuritylabs.com/aws/cve-2022-25165-aws-vpn-client/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CyberSecurityUP/Cloud-Security-Attacks
- https://github.com/H4cksploit/CVEs-master
- https://github.com/Jaikumar3/Cloud-Security-Attacks
- https://github.com/Mehedi-Babu/security_attacks_cloud
2024-06-22 09:37:59 +00:00
- https://github.com/RhinoSecurityLabs/CVEs
2024-05-25 21:48:12 +02:00
- https://github.com/SummitRoute/csp_security_mistakes
- https://github.com/atesemre/awesome-aws-security
- https://github.com/blaise442/awesome-aws-security
- https://github.com/jassics/awesome-aws-security
- https://github.com/merlinepedra/RHINOECURITY-CVEs
- https://github.com/merlinepedra25/RHINOSECURITY-CVEs
- https://github.com/thomasps7356/awesome-aws-security
- https://github.com/zlw9991/netflix-password-sharing-with-vpn-risks